Ken Xie, Fortinet | Fortinet Accelerate 2019
>> live from Orlando, Florida It's the que covering Accelerate nineteen. Brought to you by Ford. >> Welcome back to the Q. We air live in Orlando, Florida At Fortinet Accelerate twenty nineteen Lisa Martin with Peter Burst. Pleased to welcome back one of our alumni on ly the CEO and founder of Fortinet. Kensi. Ken, thank you so much for joining Peter and me on the Cuban. Thanks for having the Cube back at accelerate. >> Yeah, I love to be here again. Yeah, Thank you. >> So, so quick by the numbers Can Kino. This morning was awesome. Loved the music and all the lights to start four thousand attendees from forty countries. You guys now have about three hundred eighty five thousand customers globally. Your revenue and F eighteen was up twenty percent year on year. I could go on and on. Lots of partners, lots of academies, tremendous growth. Talk to us about in the evolution of security. Where are we today and why is supporting that so well positioned to help customers dramatically transform security >> First world happy to see all the partner of the cosmos were come here. And also we keep him like every year we in this program also is a great program on another side. Like I say, securities of wherever dynamic space you need to keep in landing on We see more and more people come here s o that's we'LL be happy to discuss in the new technology the new market opportunity and also the new trend on DH Also What we see is a the space is so old and I'm making Also we see a lot of people keeping come here for the training for other sins And also I love the music make make us feel young again So But I >> think one of the reasons why security is so dynamic it is you don't for example, in the server world you don't have, you know you know gangs of bad guys running around with baseball bats trying to eat your servers. In the security world, you have people trying to enable the business to be able to do more, but also people constantly trying to tear the business down. And that tension drives a lot of invention and requires a lot of innovation. How is that changing? We're driving some of the key trends and networks and network security >> Yeah, that's where like I presented this morning. Wait, You see, with more device connected, Actually motive, I Some people being connect today and eventually in few years we'LL be calm. Motive eyes on people. There also is all the five G or icy went technology you can make is connected faster, more broadly reached. And then there's a more application More data also come to the Internet. So that's all you quist tax servants. There's all additional risk We'LL have all this connection. We have all these data transfer to all these different diversity on people. So that's all security business, right? Because secure to have the address where they now walking cannot really are dresses above the connection above the speed. So we have our dressing a content layered application layer the device user layer all regionally or country lier s O. That's making the security always keeping foreign faster than the night walk in the night. He spending on the study become the biggest sector United ninety idea spending environment. That's also one time we just feel security also need a study merger convert together is not working because no longer oh now will get only kind of the speed I can activities secure, canniness and bob. They had to be working together to smart rain route. In a data, put a low risk area tow without a polluted like transfer. All this conscience on that way, see, is the two industries that emerged together. That's where Koda security driven that walk are the arson about how this kind of we see today the mobile on cloud started replacing the traditional PC, right? So about going forward, the wearable divine's all the glass and we award study replaced the mobile. You don't have the whole mobile phone the season, while they're probably in your eyes on the same piled. A smart car that's my home, the wise every single connecting way Are you walking? Like if I walking here our sins related my information on power for me so I don't have to carry innocents, so that's going for you. A few years we'LL be happy. First, security will be part of this space. How this will be going forward contrato today The mobile the cloud way also have some discussion about that one. So we need to prepare for all this because that's how fortunate being founded. That's how our culture about generation, about long career advancement. So that's where we want to make sure the technology the part already for this chance. That's what gave the use of the past benefit of leverage of connection. Same time, lower the risk >> organ has taken an approach in the marketplace of Let Me Step Back. Put it this way. We all talk about software to find everything in virtual ization, and that's clearly an important technology and important trend. Ford has taken advantage of that as well, but the stuff doesn't run. All that's offered stuff doesn't run on hamsters. It runs in hardware. Unfortunate has made taking a strategic position, and it's been a feature of your nearly twenty year history to continuously invest in hardware and open up the performance aperture. Increase the size of the bucket of that hardware. How is that? Both altered your ability to add additional functionality, get ahead of the curve relative to competition, but also enabled your ecosystem to do a lot of new and interesting things that we're not seeing on other another network security companies? >> Yeah, that's why I totally agree with you. Israeli howto unable the past ecosystem for everybody playing a space for the partners of his provider, carrier enterprise, on the photo leverage technology benefit. More broadly, Cosmo base is very important. That's where we feel like a sulfur cloud. They do study in kind of a change, a lot of sense. But you also need a balance among clothes. Suffers were important, but also the hardwork also very important. All right, so that's the hybrid. More post the power on the sulfur. Both the cloud at age both have equal equal weight. Equally important, going forward How to leverage all this post is also also kind of very important for the future growth of future trend Another So you also can see like a mission. Uh, will you have the immersive device? We'LL have some, like security applied in tow Storage in that work in small Sadie, you also need a bad lie. Security be part of it. No, just security. I don't cop as a cost of additional Whatever process are all since, But you know, once you make it secure to be part ofthe like we mentioned a security for even that Working security driven like a future like a wearable device or the other since without it will be huge ecosystem going forward. That's where is the chip technology you can. Bad. We just saw Fervor is also additional servants. We can all walk in together. So that's where we want to look at the whole spectrum. There, make sure different part all can walk in together on also different technology. No, just limiting some part of it. I make sure the faux technologists face hole. Attack service can be a poor tag. And also we can leverage for the security of the high table addition. Opinions? You know, this conducted a war. >> This is what you're calling the third generation of Security? >> Yes, there's more. You for structure security. That's the whole security compared tto first dinners and second generation is our security just secured himself right. So you don't involve with other night walking star recharge the infrastructure? No, because Because they view everything you inside the companies secure You only need a guard at the door This Hey, who has come here? Anything inside I'll find But with today all the mobile pouring on Devise all the data everywhere Go outside the company you need to make sure security for all of the data. So that's the new trend. So now the border disappeared. So it doesn't matter. You said the company or not, is no longer secure anymore because you can use the mobile, the access rights o outside. All people can also come here with data also go out. So that's where the infrastructure security neither give or imposing their work inside on points. I under the cloud of the age and all this a different device on the diversity. Why? So you're even your mobile phone? Hi! Still working together. So it's a much bigger before structure. Much bigger are traceable space. Now that's making secure, more exciting. >> Well, we have gotten used over the past twenty years of building applications that operate on somebody else's device, typically a PC or mobile phone. And we've learned how to deal with that. You're suggesting that we're actually going to be integrating our systems with somebody else's systems at their edge or our edge on a deeply intimate level and life and death level. Sometimes on that, obviously, place is a real premium on security and networking whatnot. So how does the edge and the cloud together informed changes and how we think about security, how we think about networking, >> That's where, like I think age and a cloud they each complaint. Different role, because architecture. So the cloud has a good C all the bigger picture. They're very good on the provisioning. There could archiving cloud, also relatively slow, and also you can see most of data generated and age. That's where, whether you're immersive device, all your mobile, whatever ages were we called a digital made physical, and that's all the people in Device Connect. So that's where, like a seven eighty percent data, Carrion a probably never traveled to the club. They need a processed locally. They also need have the privacy and autonomy locally and also even interactive with other eighty vice locally there. So that's what we see is very important. Both the cloud on age security can be addressed together and also celebrity of architecture, that I say the cloud is good for detection so you can see a something wrong. You can cry the information, but the age new market on the provisions, because prevention need to be really time needed back, moreover, quickly because a lot of application they cannot afford a late Nancy like where do the V I. R. Even you slow down in a microsecond. Pickle feet is the famous signals. You also see the also drive a car. If you react too slow, you may hear something right the same scene for a lot of harder. Even you. Commerce, whatever. If you not response picking out within a half second, people may drop the connection. The memos are married, so that's what the late and see the speed on DH that's making the club play there at all into all this management on their age, playing hero in a really kind on Barlow. Ladies, you're really kind reaction there. So what? That's where we see the both side need to play their role on important transposed market. You said that just a one cloud, which I feel a little bit too hard right now. Try to cool down a little bit of our same age. Also, we see a very important even going forward what I been a bad security in age >> with this massive evolution that you've witnessed for a very long time. As the head of forty nine last nearly twenty years EJ cloud. How how dramatically technology changes in such a short period of time. I'm curious. Can How has your customer conversations evolved in terms of, you know, ten years ago were you talk ng more to security professionals? And now are you talking more to the C suite? As security is fundamental? Teo Digital transformation and unlocking tremendous value in both dollars in society impact has that conversation elevated as security has changed in the threat landscape has changed. >> Yeah, they do go to the board level, the CEO level now compared to like a ten, twenty years ago. Probably gaiety people maybe see so level, because security become probably the most important part of it. Now they keep you got a high high percentage that ikey spending there because when we connect everything together, we can make all the people all this business together to be on the connection. That's where security handled up, right? So that's where we see security studying kind of more. You hope me more important now. But another side, also the space also changing over quick. So that's where we always have to learn it. Woman engaged with Cosmo partner here. That's where this event is about way keeping less into what's the issue they have, how we can help the dress. All these security really the usual. Some even be honest security. Go to like a connection you for structure, some other, like architectural design, whatever their penis model there. So that's all we're very important on. Like I said, security space we need to keep in Lenny every day. Even I spent a few hours a day to Lenny. I You don't feel ready? Can K child? Oh, they >> said, It's a very dynamic world security world. >> You have our dynamic, the knowledge base, the technology refreshed quickly. Way always had to be Len have training. That's where he also see Try to position forty Niners lending company. So that's where we all for the because training program and all the train is afraid for partner for customers. All this kind is really it's a big investment. That's where a lot of people say, Oh, how can you? You've asked more in the training. You said of all come better. You must move your marketing. I say journeys of over a long term benefit. When people get trained, they also see Hey, what's the pants technology? So that's where a lot of organization, a lot of investment, really looking for. How five years here come benefit of space can benefit. The car's my partner, so that's all we see. Training's far long time measurement see modern technology. >> So can you've talked in the keynote? You've talked in the Cube about how networking security come together on how, as they move forward, they're going in form. Or they'LL have an impact on business and have an impact and other technologies. There's a lot of technology change when you talk to network in professional or even your own employees. What technologies out there do you think are going to start impacting how security works? Micro services containers? Are there any technologies that Ford that's looking at and saying, We gotta watch that really closely and that networking professionals have to pay more attention to. I >> have to say pretty much all of them, right? So all these Michael, all this contender technology, micro segmentation, according computing, the immersion lending all this is all very important because security has deal with all this different new technology application on like it was all this a huge, competent power raised on the cost lower ball corner computer. And maybe some of the old technology may not really work any more for some additional risks. Like where the equipment can be break by cute from the computing or some moderate eventually can also kind of take over. All this country is always we tryto tryto learn, tryto tried. Okay, chop every day. Hey, that that's what I say is that's so exciting. Keep you wake up, Keep your Lenny everyday, which I enjoy. But at the same time, there's a lot of young people they probably even even better than us to catch the new technology. >> Oh, no. Oh, no, no, no. >> Yeah. Somehow, my kids can play the fool much greater than mere. That's always the way >> we want to thank you so much for joining Peter and me on the kid this afternoon for having the Cube back at forty nine. Accelerate and really kind of talking about how you guys are leading in the space and we're gonna be having more guests on from Fortinet. And your partner's talking about educate ecosystems and technology that you talked about in your keynote. So we thank you again for your time. And we look forward to a very successful day here. >> Oh, thank you. Thank you very much. You enjoy all this programme for many years. Thank you. >> Excellent. We love to hear that. We want to thank you for watching the Cube for Peter Burress. I'm Lisa Martin. You're watching the Cube. >> Thank you.
SUMMARY :
live from Orlando, Florida It's the que covering and me on the Cuban. Yeah, I love to be here again. Loved the music and all the lights to start four thousand attendees from forty a lot of people keeping come here for the training for other sins And also I love the music in the server world you don't have, you know you is all the five G or icy went technology you can make is connected faster, functionality, get ahead of the curve relative to competition, but also enabled your ecosystem All right, so that's the hybrid. You said the company or not, is no longer secure anymore because you can use So how does the edge and the cloud together DH that's making the club play there at all into all this management on their age, security has changed in the threat landscape has changed. be on the connection. You have our dynamic, the knowledge base, the technology refreshed quickly. There's a lot of technology change when you talk to network in professional or even your own And maybe some of the old technology may not really work any more for some additional That's always the way So we thank you again for your time. Thank you very much. We want to thank you for watching the Cube for Peter Burress.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Peter | PERSON | 0.99+ |
Ken Xie | PERSON | 0.99+ |
Fortinet | ORGANIZATION | 0.99+ |
Ford | ORGANIZATION | 0.99+ |
Orlando, Florida | LOCATION | 0.99+ |
Peter Burst | PERSON | 0.99+ |
five years | QUANTITY | 0.99+ |
forty countries | QUANTITY | 0.99+ |
second generation | QUANTITY | 0.99+ |
Peter Burress | PERSON | 0.99+ |
First | QUANTITY | 0.99+ |
Ken | PERSON | 0.99+ |
Kensi | PERSON | 0.99+ |
Nancy | PERSON | 0.99+ |
today | DATE | 0.99+ |
Michael | PERSON | 0.99+ |
both side | QUANTITY | 0.98+ |
one time | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
both dollars | QUANTITY | 0.98+ |
third generation | QUANTITY | 0.98+ |
Lenny | PERSON | 0.98+ |
2019 | DATE | 0.98+ |
four thousand attendees | QUANTITY | 0.98+ |
Both | QUANTITY | 0.98+ |
two industries | QUANTITY | 0.97+ |
about three hundred eighty five thousand customers | QUANTITY | 0.97+ |
forty nine | DATE | 0.97+ |
Can Kino | ORGANIZATION | 0.96+ |
both | QUANTITY | 0.96+ |
ten years ago | DATE | 0.96+ |
seven eighty percent | QUANTITY | 0.96+ |
one cloud | QUANTITY | 0.95+ |
Fervor | ORGANIZATION | 0.95+ |
Len | PERSON | 0.95+ |
first dinners | QUANTITY | 0.94+ |
Accelerate nineteen | ORGANIZATION | 0.93+ |
ten, twenty years ago | DATE | 0.92+ |
twenty percent | QUANTITY | 0.92+ |
forty nine | QUANTITY | 0.91+ |
ninety idea | QUANTITY | 0.91+ |
this morning | DATE | 0.91+ |
eighty vice | QUANTITY | 0.89+ |
this afternoon | DATE | 0.86+ |
nearly twenty year | QUANTITY | 0.85+ |
a half second | QUANTITY | 0.84+ |
eighteen | QUANTITY | 0.81+ |
tryto | PERSON | 0.8+ |
each complaint | QUANTITY | 0.8+ |
Koda | ORGANIZATION | 0.79+ |
forty Niners | QUANTITY | 0.79+ |
This morning | DATE | 0.78+ |
Carrion | ORGANIZATION | 0.78+ |
Cosmo | ORGANIZATION | 0.78+ |
Cube | COMMERCIAL_ITEM | 0.78+ |
United | ORGANIZATION | 0.77+ |
partners | QUANTITY | 0.74+ |
Cuban | OTHER | 0.73+ |
a microsecond | QUANTITY | 0.69+ |
nineteen | ORGANIZATION | 0.67+ |
twenty years | QUANTITY | 0.66+ |
few hours a day | QUANTITY | 0.65+ |
Teo | PERSON | 0.64+ |
Sadie | ORGANIZATION | 0.63+ |
Israeli | OTHER | 0.6+ |
G | OTHER | 0.54+ |
twenty | QUANTITY | 0.54+ |
cosmos | LOCATION | 0.51+ |
Barlow | ORGANIZATION | 0.51+ |
EJ cloud | ORGANIZATION | 0.51+ |
Accelerate | ORGANIZATION | 0.5+ |
single | QUANTITY | 0.49+ |
Cube | TITLE | 0.48+ |
past | DATE | 0.44+ |